최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.16 no.1, 2006년, pp.49 - 58
H. Stone, 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,' NEC Technical Report, 1996
V. Wahadaniah, Y.L. Guan, and H.C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings of IWDW, 2002, pp. 88-103
B. Pfitzmann and M. Schunter, 'Asymmetric Fingerprinting,' Journal of the ACM, Vol. 33, 1986, pp. 792-807
B. Pfitzmann and M. Waldner, 'Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUROCRYPT'97, Vol. 1233, of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp. 88- 102
B. Pfitzmann and A. Sadeghi, 'Coin-Based Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUROCRYPT'99, Vol. 1592, of Lecture Notes in Computer Science, Springer-Verlag, 1999, pp. 150- 164
H. Zhao, M, Wu, Z.J.Wang, and K.J.R. Liu, 'Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia,' in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP' 03), pp. 664-667, Hong Kong, Apr. 2003
D. Boneh and J. Shaw, 'Collusion-Secure Fingerprinting for Digital Data,' IEEE Trans. Inf. Theory, Vol. 44, No. 5, Sep. 1998, pp. 1897-1905
J. Dittmann, 'Combining Digital Watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth ., Mar, 2000, pp. 128-132
J. Domingo-Ferrer and J, Herrera-Joancomarti, 'Simple Collusion-secure Fingerprinting Schemes for Images,' in IEEE International Conference on Information Technology: Coding and Computing, ITCC'2000, ISBN 0-7695¬0540-6, pp. 128-132
Yiwei Wang, John F. Doherty, and Robert E. Van Dyck, 'A Watermarking Algorithm for Fingerprinting Intelligence Images,' 2001 Conference on Information Sciences and Systems, The Johns Hopkins University, March 21-23, 2001
W, Trappe, M. Wu, and K.J.R. Liu, 'Collusion-Resistant Fingerprinting for Multimedia,' Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02), Vol. IV, Orlando, FL, May 2002, pp. 3309-3312
F. Sebe and J. Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, 2002, pp. 316- 327
B. Pfitzmann, 'Trials of Traced Traitors,' Information Hiding, Lecture Notes in Computer Science, Vol. 1174, Springer- Verlag, 1996, pp. 49-64
J. Domingo-Ferrer, 'Anonymous Finger-printing of Electronic Information with Automatic Identification of Redistributors,' Electronics Letters Vol. 34, No. 13, 1998, pp. 1303-1304
J. Kilian, T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, and F. Zane, 'Resistance of Digital Watermarks to Collusive Attacks,' Tech. Rep., TR-585-98, Dept. of Computer Science, Prinston University, 1998
W. Trappe, M. Wu, Z. Jane Wang, and K.J.R. Liu, 'Anti-Collusion Fingerprinting for Multimedia.' IEEE Trans..on Signal Processing, Vol. 51, No.4, Apr. 2003, pp 1069-1087
Won-gyum Kim and Youngho Suh. 'Short N-Secure Fingerprinting Code for Image,' in Proceedings of IEEE International Conference on Image Processing(ICIP 2004), pp 2167-2170, Oct. 24-27, 2004
F. Ergun, J. Kilian, and R. Kumar, 'A note on the limits of collusion-resistance watermarks,' in Proc. Eurocrypto'99, pp. 140-149, 1999
Z.J.Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R Liu, 'Resistance of Orthogonal Gaussian Fingerprint to Collusion Attacks,' in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP' 03), pp. 724-727, Hong Kong, Apr. 2003
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.